Mar 82 min readNavigating Cybersecurity in Mergers and Acquisitions: A Holistic ApproachMergers and acquisitions (M&As) are pivotal to the growth strategies of numerous companies, serving as a linchpin for maintaining a...
Dec 5, 20234 min readPreparing for DORA Compliance: Strengthening ICT Supplier Risk Management in FinanceThe Digital Operational Resilience Act (DORA) Explained The Digital Operational Resilience Act (DORA) is a comprehensive regulatory...
Nov 27, 20232 min readStrengthening Supply Chain Defenses Against Ransomware: Insights from Xplain and Concevis IncidentsThe ransomware attacks on Xplain and Concevis, two Swiss IT service providers, represent critical case studies in understanding the...
Nov 21, 20234 min readHarnessing C2SEC's XSPM to Empower Gartner's CTEM FrameworkIn the complex and ever-changing landscape of cybersecurity, Gartner's Continuous Threat Exposure Management (CTEM) framework, introduced...
Oct 17, 20232 min readThe Hidden Risks of Third-Party App Consents in Microsoft 365As we delve deeper into the intricacies of managing critical SaaS dependencies like Microsoft 365 within the broader context of attack...
Oct 4, 20232 min readIntroducing XSPM: Redefining the Paradigm in Attack Surface and Security Posture Management! We are excited to unveil XSPM, our transformative Extended Security Posture Management SaaS platform. This innovation marks a pivotal...